Generalized bisimulation metrics K Chatzikokolakis, D Gebler, C Palamidessi, L Xu International Conference on Concurrency Theory, 32-46, 2014 | 68 | 2014 |
A Survey on Adversarial Attacks in Computer Vision: Taxonomy, Visualization and Future Directions T Long, Q Gao, L Xu, Z Zhou Computers & Security, 102847, 2022 | 56 | 2022 |
1dVul: Discovering 1-Day Vulnerabilities through Binary Patches J Peng, F Li, B Liu, L Xu, B Liu, K Chen, W Huo 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019 | 37 | 2019 |
Metrics for differential privacy in concurrent systems L Xu, K Chatzikokolakis, H Lin International Conference on Formal Techniques for Distributed Objects …, 2014 | 24 | 2014 |
B2SMatcher: fine-Grained version identification of open-Source software in binary files G Ban, L Xu, Y Xiao, X Li, Z Yuan, W Huo Cybersecurity 4 (1), 1-21, 2021 | 11 | 2021 |
Modular reasoning about differential privacy in a probabilistic process calculus L Xu International Symposium on Trustworthy Global Computing, 198-212, 2012 | 9 | 2012 |
A Light-Weight and Accurate Method of Static Integer-Overflow-to-Buffer-Overflow Vulnerability Detection M Xu, S Li, L Xu, F Li, W Huo, J Ma, X Li, Q Huang International Conference on Information Security and Cryptology, 404-423, 2018 | 8 | 2018 |
A Sanitizer-centric Analysis to Detect Cross-Site Scripting in PHP Programs H Su, L Xu, H Chao, F Li, Z Yuan, J Zhou, W Huo 2022 IEEE 33rd International Symposium on Software Reliability Engineering …, 2022 | 6 | 2022 |
ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis L Xu, M Xu, F Li, W Huo Cybersecurity 3 (1), 1-19, 2020 | 6 | 2020 |
VERJava: Vulnerable Version Identification for Java OSS with a Two-Stage Analysis Q Sun, L Xu, Y Xiao, F Li, H Su, Y Liu, H Huang, W Huo 2022 IEEE International Conference on Software Maintenance and Evolution …, 2022 | 4 | 2022 |
Formal verification of differential privacy in concurrent systems L Xu Ecole Polytechnique (Palaiseau, France), 2015 | 4 | 2015 |
Splendor: Static Detection of Stored XSS in Modern Web Applications H Su, F Li, L Xu, W Hu, Y Sun, Q Sun, H Chao, W Huo Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 3 | 2023 |
Performance Optimization of Large Files Writes to Ceph Based on Multiple Pipelines Algorithm K Zhan, L Xu, Z Yuan, W Zhang 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2018 | 3 | 2018 |
Complete proof systems for amortised probabilistic bisimulations LL Xu, HM Lin Journal of Computer Science and Technology 31 (2), 300-316, 2016 | 1 | 2016 |
分摊概率互模拟的完备证明系统 LL Xu, HM Lin 计算机科学技术学报 31 (2), 300-316, 2016 | | 2016 |
A Multiplicative Variant of the Kantorovich distance for Differential Privacy L Xu, K Chatzikokolakis, C Palamidessi | | |